Modern Cryptography: The Practical Guide
- 8h 8m
- Sandip Dholakia
- Rheinwerk Publishing Inc.
- 2024
Security professionals, you know encryption is essential to protect your data. In this book, learn about the cryptography fundamentals—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce data and web security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today’s security threats!
Includes a foreword by Dr. Taher Elgamal, inventor of the Elgamal cryptosystem and known as the "father of SSL".
- Use symmetric and asymmetric cryptography to protect your data
- Work with hash functions, digital signatures, MAC, PKI, and encryption key management
- Learn about homomorphic encryption, post-quantum encryption, cloud encryption, and other applications of modern cryptography
About the Author
Sandip Dholakia is an author, cryptographer, and information security professional. He works as a principal security architect within the Global Security and Compliance group at SAP America. Sandip is a co-chair of the Cryptography Center of Excellence (CoE) and a core member of the AI for Security task force at SAP. As a co-chair of Cryptography CoE, he is actively engaged in developing an enterprise-wide cryptoagility program, focusing on post-quantum cryptography strategies. Before joining SAP, Sandip was an information security architect at Cisco and a security architect and compliance leader at General Motors.
Sandip holds a US patent and defensive publication for designing and developing a cryptography-based antitheft algorithm. He has also published a book and papers about various security topics, including log management, zero-trust architecture, encryption, and security configuration. Sandip graduated from Carnegie Mellon University with dual master’s degrees in software engineering and information systems management. He holds CISSP, CCSP, CCSK, GWAPT, and AWS security certifications. Please visit Google Scholar for the complete list of his publications.
In this Book
-
Foreword
-
Fundamentals of Cryptography
-
Symmetric Cryptography
-
Asymmetric Cryptography
-
Cryptography Services
-
Storage Security: Data Encryption at Rest
-
Web Security: Data Encryption in Transit
-
Cloud and Connected Device Cryptography
-
Cryptography in Cryptocurrency
-
Cryptography and Artificial Intelligence
-
Post-Quantum Cryptography
-
Homomorphic Encryption
-
Cryptography Attacks and Ransomware
-
Cryptography Standards and Resources
-
Future Trends and Concluding Remarks